The Morgan Kaufmann Series in Multimedia Information and Systems
Download 208.15 Kb. Pdf ko'rish
|
01 Front Matter
CONTENT AND ORGANIZATION
The organization of this book closely follows that of the original. The treatment of watermarking and steganography is, for the most part, kept separate. The rea- sons for this are twofold. First, we anticipate that readers might prefer not to read the book from cover to cover, but rather read specific chapters of interest. And second, an integrated revision would require considerably more work. Chapters 1 and 2 include new material related to steganography and, where necessary, updated material related to watermarking. In particular, Chapter 2 high- lights the similarities and differences between watermarking and steganography. Chapters 3, 4, 7, 8, 9, and 10 remain untouched, except that bibliographic citations have been updated. Chapter 5 of the first edition has now been expanded to two chapters, reflecting the research interest in modeling watermarking as communications with side information. Chapter 5 provides a more detailed theoretical discus- sion of the topic, especially with regard to dirty-paper coding. Chapter 6 then provides a description of a variety of common dirty-paper coding techniques for digital watermarking. Section 11.1.3 in Chapter 11 has been revised to include material on a variety of erasable watermarking methods. Finally, two new chapters, Chapters 12 and 13, have been added. These chapters discuss steganography and steganalysis, respectively. xix xx Preface to the Second Edition ACKNOWLEDGMENTS The authors would like to thank the following people: Alan Bell of Warner Brothers for discussions on HD-DVD digital rights management technology, John Choi for discussions relating to watermarking of MP3 files in Korea, David Soukal for creating graphics for the Stego chapter. And of course we would like to thank our families and friends for their support in the endeavor: Rimante Okkels; Zoe, Geoff, and Astrid Cox; Pam Bloom and her watermarking team of Joshua, Madison, Emily Giedre, Fia, and Ada; Monika, Nicole, and Kathy Fridrich; Miroslav Goljan; Robin Redding; and all the animals. Finally, to Matt, your coauthors send their strongest wishes—get well soon! Example Watermarking Systems In this book, we present a number of example watermarking systems to illus- trate and test some of the main points. Discussions of test results provide additional insights and lead to subsequent sections. Each investigation begins with a preamble. If a new watermarking system is being used, a description of the system is provided. Experimental procedures and results are then described. The watermark embedders and watermark detectors that make up these sys- tems are given names and are referred to many times throughout the book. The naming convention we use is as follows: All embedder and detector names are written in sans serif font to help set them apart from the other text. Embedder names all start with E _ and are followed by a word or acronym describing one of the main techniques illustrated by an algorithm. Similarly, detector names begin with D _ followed by a word or acronym. For example, the embed- der in the first system is named E _ BLIND (it is an implementation of blind embedding), and the detector is named D _ LC (it is an implementation of linear correlation detection). Each system used in an investigation consists of an embedder and a detector. In many cases, one or the other of these is shared with several other systems. For example, in Chapter 3, the D _ LC detector is paired with the E _ BLIND embedder in System 1 and with the E _ FIXED _ LC embedder in System 2. In subsequent chapters, this same detector appears again in a number of other systems. Each individual embedder and detector is described in detail in the first system in which it is used. In the following, we list each of the 19 systems described in the text, along with the number of the page on which its description begins, as well as a brief review of the points it is meant to illustrate and how it works. The source code for these systems is provided in Appendix C. System 1: E _ BLIND/D _ LC . . . . . . . . . . . . . . . . . . . . . 70 Blind Embedding and Linear Correlation Detection: The blind embedder E _ BLIND simply adds a pattern to an image. A reference pattern is scaled by a strength parameter, ␣, prior to being added to the image. Its sign is dictated by the message being encoded. The D _ LC linear correlation detector calculates the correlation between the received image and the reference pattern. If the magnitude of the correlation is higher than a threshold, the watermark is declared to be present. The message is encoded in the sign of the correlation. Download 208.15 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling